021-1

123456789101112131415161718192021222324
Across
  1. 1. Term for when security is breached
  2. 5. Malicious code used in the attack
  3. 7. Joint groups formed to improve cybersecurity
  4. 8. Efforts to reduce the impact of the attack
  5. 10. Tech giant also affected by the attack
  6. 13. Public and private sectors working together
  7. 14. Russian state-sponsored group behind the attack
  8. 15. U.S. Department of Homeland Security's response
  9. 17. Type of actor behind the attack
  10. 19. Another name for the attackers
  11. 20. Key focus in the aftermath of the attack
  12. 22. Type of analysis conducted to investigate the attack
  13. 24. Weaknesses exploited by the attackers
Down
  1. 2. Techniques used by attackers to avoid detection
  2. 3. Another term for the security incident
  3. 4. Process of uncovering the details of the attack
  4. 5. U.S. response to the attack
  5. 6. IT company at the center of the attack
  6. 9. The effect of the attack on organizations
  7. 11. Cybersecurity firm that discovered the breach
  8. 12. Software updates released by SolarWinds
  9. 16. Actions pursued against the attackers
  10. 18. U.S. department that was compromised
  11. 21. U.S. body that held hearings on the attack
  12. 23. SolarWinds product that was compromised